The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Cisco NX-OS

vulnerability bulletin CVE-2019-1589

Cisco Nexus 9000 ACI: information disclosure via Unmeasured Boot

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Unmeasured Boot of Cisco Nexus 9000 ACI, in order to obtain sensitive information.
Impacted products: Nexus by Cisco, NX-OS.
Severity: 1/4.
Consequences: data reading.
Provenance: user console.
Creation date: 02/05/2019.
Identifiers: cisco-sa-20190501-aci-unmeasured-boot, CSCvn09807, CVE-2019-1589, VIGILANCE-VUL-29183.

Description of the vulnerability

An attacker can bypass access restrictions to data via Unmeasured Boot of Cisco Nexus 9000 ACI, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-1615

Cisco NX-OS: privilege escalation via Software Image Signature Verification

Synthesis of the vulnerability

An attacker can bypass restrictions via Software Image Signature Verification of Cisco NX-OS, in order to escalate his privileges.
Impacted products: Nexus by Cisco, NX-OS.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: privileged account.
Creation date: 20/03/2019.
Identifiers: cisco-sa-20190306-nxos-sig-verif, CSCvj14135, CSCvk70903, CSCvk70905, CVE-2019-1615, VIGILANCE-VUL-28783.

Description of the vulnerability

An attacker can bypass restrictions via Software Image Signature Verification of Cisco NX-OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2019-1601

Cisco NX-OS: privilege escalation via Filesystem Access

Synthesis of the vulnerability

An attacker can bypass restrictions via Filesystem Access of Cisco NX-OS, in order to escalate his privileges.
Impacted products: Nexus by Cisco, NX-OS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, data reading, data creation/edition.
Provenance: user account.
Creation date: 20/03/2019.
Identifiers: cisco-sa-20190306-nxos-file-access, CSCvi42317, CSCvi42331, CSCvi96476, CSCvi96478, CSCvi96486, CVE-2019-1601, VIGILANCE-VUL-28782.

Description of the vulnerability

An attacker can bypass restrictions via Filesystem Access of Cisco NX-OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2019-1613

Cisco NX-OS: privilege escalation via CLI Command Injection

Synthesis of the vulnerability

An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges.
Impacted products: Nexus by Cisco, NX-OS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user console.
Creation date: 20/03/2019.
Identifiers: cisco-sa-20190306-nxos-cmdinj-1613, CSCvj63807, CSCvj65654, CSCvk50903, CSCvk50906, CVE-2019-1613, VIGILANCE-VUL-28780.

Description of the vulnerability

An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2019-1591

Cisco Nexus 9000: privilege escalation via ACI Mode Shell Escape

Synthesis of the vulnerability

An attacker can bypass restrictions via ACI Mode Shell Escape of Cisco Nexus 9000, in order to escalate his privileges.
Impacted products: Nexus by Cisco, NX-OS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Creation date: 20/03/2019.
Identifiers: cisco-sa-20190306-aci-shell-escape, CSCvm52063, CVE-2019-1591, VIGILANCE-VUL-28779.

Description of the vulnerability

An attacker can bypass restrictions via ACI Mode Shell Escape of Cisco Nexus 9000, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-0456

Cisco NX-OS: denial of service via SNMP

Synthesis of the vulnerability

An attacker can send malicious SNMP packets to Cisco NX-OS, in order to trigger a denial of service.
Impacted products: Nexus by Cisco, NX-OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user account.
Creation date: 18/10/2018.
Identifiers: CERTFR-2018-AVI-502, cisco-sa-20181017-nxos-snmp, CSCvj70029, CVE-2018-0456, VIGILANCE-VUL-27561.

Description of the vulnerability

The Cisco NX-OS product has a service to manage received SNMP packets.

However, when malicious SNMP packets are received, a fatal error occurs.

An attacker can therefore send malicious SNMP packets to Cisco NX-OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-0395

Cisco NX-OS: denial of service via LLDP

Synthesis of the vulnerability

An attacker can generate a fatal error via LLDP of Cisco NX-OS, in order to trigger a denial of service.
Impacted products: Nexus by Cisco, NX-OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Creation date: 18/10/2018.
Identifiers: CERTFR-2018-AVI-502, cisco-sa-20181017-fxnx-os-dos, CSCuc98542, CSCvf23367, CSCvj94174, CSCvj96148, CVE-2018-0395, VIGILANCE-VUL-27559.

Description of the vulnerability

An attacker can generate a fatal error via LLDP of Cisco NX-OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-3646

Intel processors: information disclosure via Foreshadow L1TF Virtualization

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via L1TF Virtualization on Intel processors, in order to obtain sensitive information.
Impacted products: SNS, Mac OS X, Arkoon FAST360, Cisco ASR, Nexus by Cisco, NX-OS, Cisco UCS, XenServer, Debian, NetWorker, Unisphere EMC, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP ProLiant, QRadar SIEM, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, OpenBSD, openSUSE Leap, Oracle Communications, Solaris, pfSense, RHEL, SIMATIC, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, vCenter Server, VMware vSphere Hypervisor, VMware Workstation, Xen.
Severity: 2/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 16/08/2018.
Identifiers: 525211, 528031, ADV180018, CERTFR-2018-AVI-385, CERTFR-2018-AVI-386, CERTFR-2018-AVI-387, CERTFR-2018-AVI-388, CERTFR-2018-AVI-390, CERTFR-2018-AVI-391, CERTFR-2018-AVI-392, CERTFR-2018-AVI-416, CERTFR-2018-AVI-419, CERTFR-2018-AVI-426, CERTFR-2018-AVI-557, CERTFR-2018-AVI-584, CERTFR-2019-AVI-169, cisco-sa-20180814-cpusidechannel, cpuapr2019, cpujan2019, CTX236548, CVE-2018-3646, DLA-1481-1, DLA-1506-1, DSA-2018-170, DSA-2018-217, DSA-4274-1, DSA-4279-1, DSA-4279-2, FEDORA-2018-1c80fea1cd, FEDORA-2018-f8cba144ae, Foreshadow, FreeBSD-SA-18:09.l1tf, HPESBHF03874, HT209139, HT209193, ibm10742755, INTEL-SA-00161, JSA10937, K31300402, openSUSE-SU-2018:2399-1, openSUSE-SU-2018:2404-1, openSUSE-SU-2018:2407-1, openSUSE-SU-2018:2434-1, openSUSE-SU-2018:2436-1, openSUSE-SU-2018:4304-1, RHSA-2018:2384-01, RHSA-2018:2387-01, RHSA-2018:2388-01, RHSA-2018:2389-01, RHSA-2018:2390-01, RHSA-2018:2391-01, RHSA-2018:2392-01, RHSA-2018:2393-01, RHSA-2018:2394-01, RHSA-2018:2395-01, RHSA-2018:2396-01, RHSA-2018:2602-01, RHSA-2018:2603-01, SSA-254686, STORM-2018-005, SUSE-SU-2018:2328-1, SUSE-SU-2018:2331-1, SUSE-SU-2018:2332-1, SUSE-SU-2018:2335-1, SUSE-SU-2018:2338-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2362-1, SUSE-SU-2018:2366-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2380-1, SUSE-SU-2018:2381-1, SUSE-SU-2018:2384-1, SUSE-SU-2018:2394-1, SUSE-SU-2018:2401-1, SUSE-SU-2018:2409-1, SUSE-SU-2018:2410-1, SUSE-SU-2018:2480-1, SUSE-SU-2018:2482-1, SUSE-SU-2018:2483-1, SUSE-SU-2018:2528-1, SUSE-SU-2018:2596-1, SUSE-SU-2018:2637-1, SUSE-SU-2018:3490-1, SUSE-SU-2018:4300-1, Synology-SA-18:45, USN-3740-1, USN-3740-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, USN-3756-1, USN-3823-1, VIGILANCE-VUL-26999, VMSA-2018-0020, VU#982149, XSA-273, XSA-289.

Description of the vulnerability

An attacker can bypass access restrictions to data via L1TF Virtualization on Intel processors, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-3620

Intel processors: information disclosure via Foreshadow L1TF OS/SMM

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via L1TF OS/SMM on Intel processors, in order to obtain sensitive information.
Impacted products: SNS, Arkoon FAST360, Cisco ASR, Nexus by Cisco, NX-OS, Cisco UCS, XenServer, Debian, NetWorker, Unisphere EMC, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP ProLiant, QRadar SIEM, Juniper EX-Series, Juniper J-Series, Junos OS, Junos Space, SRX-Series, Linux, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, OpenBSD, openSUSE Leap, Oracle Communications, pfSense, RHEL, SIMATIC, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Ubuntu, Unix (platform) ~ not comprehensive, vCenter Server, Xen.
Severity: 2/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 16/08/2018.
Identifiers: 525211, 528031, ADV180018, CERTFR-2018-AVI-385, CERTFR-2018-AVI-386, CERTFR-2018-AVI-387, CERTFR-2018-AVI-388, CERTFR-2018-AVI-390, CERTFR-2018-AVI-391, CERTFR-2018-AVI-392, CERTFR-2018-AVI-416, CERTFR-2018-AVI-419, CERTFR-2018-AVI-426, CERTFR-2018-AVI-557, CERTFR-2018-AVI-584, CERTFR-2019-AVI-169, cisco-sa-20180814-cpusidechannel, cpuapr2019, CTX236548, CVE-2018-3620, DLA-1481-1, DLA-1506-1, DLA-1529-1, DSA-2018-170, DSA-2018-217, DSA-4274-1, DSA-4279-1, DSA-4279-2, FEDORA-2018-1c80fea1cd, FEDORA-2018-f8cba144ae, Foreshadow, FreeBSD-SA-18:09.l1tf, HPESBHF03874, ibm10742755, INTEL-SA-00161, JSA10917, JSA10937, K95275140, openSUSE-SU-2018:2404-1, openSUSE-SU-2018:2407-1, RHSA-2018:2384-01, RHSA-2018:2387-01, RHSA-2018:2388-01, RHSA-2018:2389-01, RHSA-2018:2390-01, RHSA-2018:2391-01, RHSA-2018:2392-01, RHSA-2018:2393-01, RHSA-2018:2394-01, RHSA-2018:2395-01, RHSA-2018:2396-01, RHSA-2018:2602-01, RHSA-2018:2603-01, SSA:2018-240-01, SSA-254686, STORM-2018-005, SUSE-SU-2018:2328-1, SUSE-SU-2018:2332-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2362-1, SUSE-SU-2018:2366-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2380-1, SUSE-SU-2018:2381-1, SUSE-SU-2018:2384-1, SUSE-SU-2018:2596-1, SUSE-SU-2018:2637-1, Synology-SA-18:45, USN-3740-1, USN-3740-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, USN-3823-1, VIGILANCE-VUL-26998, VMSA-2018-0021, VU#982149, XSA-273, XSA-289.

Description of the vulnerability

An attacker can bypass access restrictions to data via L1TF OS/SMM on Intel processors, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-3615

Intel processors: information disclosure via Foreshadow L1TF SGX

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via L1TF SGX on Intel processeurs, in order to obtain sensitive information.
Impacted products: SNS, Arkoon FAST360, Cisco ASR, Nexus by Cisco, NX-OS, Cisco UCS, Debian, NetWorker, HP ProLiant, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, SIMATIC, Slackware, Synology DSM, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 16/08/2018.
Identifiers: 528031, ADV180018, CERTFR-2018-AVI-387, cisco-sa-20180814-cpusidechannel, CVE-2018-3615, DLA-1506-1, DSA-2018-217, Foreshadow, HPESBHF03874, INTEL-SA-00161, SSA:2018-240-01, SSA-254686, STORM-2018-005, Synology-SA-18:45, VIGILANCE-VUL-26997, VU#982149.

Description of the vulnerability

An attacker can bypass access restrictions to data via L1TF SGX on Intel processors, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Cisco NX-OS: